Snapshot
Feb. 3, 2024 - Feb. 9, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-21762 | Fortinet FortiOS contains an out-of-bound write vulnerability that allows a remote unauthenticated attacker to execute code or commands via specially crafted HTTP requests. | CRITICAL | Fortinet | Feb. 9, 2024 |
CVE-2023-4762 | Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. | HIGH | Feb. 6, 2024 | |
Newswires |
||||
Active Exploitation of New Fortinet RCE Vulnerability Confirmed by CISA
The Cybersecurity and Infrastructure Security Agency (CISA) has verified that a critical remote code execution (RCE) vulnerability (CVE-2024-21762) in Fortinet's FortiOS system, which was recently fixed, is being actively exploited. |
Feb. 9, 2024 |
|||
Critical Remote Code Execution Vulnerability Detected in Fortinet's SSL VPN
Fortinet has issued a warning about a new critical remote code execution vulnerability in its FortiOS SSL VPN, which is likely being exploited in cyberattacks. |
Feb. 8, 2024 |
|||
Ivanti Issues Urgent Warning for New Authentication Bypass Vulnerability
Ivanti has sounded the alarm over a new authentication bypass vulnerability that is affecting its Connect Secure, Policy Secure, and ZTA gateways. |
Feb. 8, 2024 |
|||
Chinese State Actors Deploy 'Coathanger' Malware Targeting FortiGate Devices
The Military Intelligence and Security Service (MIVD) of the Netherlands has issued a warning regarding the discovery of a new malware strain, dubbed 'Coathanger', being used by the Chinese government. |
Feb. 8, 2024 |
|||
Fortinet Uncovers New Unpatched Patch Bypasses in FortiSIEM
Fortinet has issued a warning about two new unpatched patch bypasses for a severe remote code execution vulnerability in its Security Information and Event Management (SIEM) solution, FortiSIEM. |
Feb. 8, 2024 |
|||
CISA Incorporates Google Chromium V8 Bug into Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a bug in Google's Chromium V8, referred to as a 'Type Confusion bug', to its catalog of Known Exploited Vulnerabilities (KEV). |
Feb. 7, 2024 |
|||
Global Alliance and Tech Titans Join Forces Against Commercial Spyware Misuse
In a move to curb human rights abuses through the misuse of commercial spyware, a coalition of countries, including the U.S., U.K., and France, along with tech giants like Google, Meta, Microsoft, and MDSec, have signed a joint agreement. |
Feb. 7, 2024 |
|||
Google Addresses Critical Remote Code Execution Vulnerability in Android
Google has rolled out its February 2024 security patches for Android, addressing a total of 46 vulnerabilities. |
Feb. 6, 2024 |
|||
Critical Authentication Bypass Vulnerability in TeamCity On-Premises Servers
JetBrains, the software development company, has issued an urgent call to customers to patch their TeamCity On-Premises servers due to a critical authentication bypass vulnerability. |
Feb. 6, 2024 |
|||
Widespread Exploitation of Ivanti SSRF Zero-Day Vulnerability Observed
An SSRF vulnerability (CVE-2024-21893) in Ivanti's Connect Secure and Policy Secure is currently being exploited by numerous attackers. |
Feb. 5, 2024 |
|||
Mispadu Banking Trojan Exploits Patched Windows SmartScreen Flaw
The Mispadu banking Trojan, first observed in 2019, has been updated to exploit a previously patched Windows SmartScreen security bypass flaw, targeting users in Mexico. |
Feb. 5, 2024 |
|||
Critical Vulnerability in Mastodon Social Network Allows Account Takeovers
Mastodon, a decentralized social networking platform, has patched a critical vulnerability, identified as CVE-2024-23832, that could allow attackers to impersonate and seize control of any user's account. |
Feb. 3, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-23109 (11) | An improper neutralization of special elements used in an os command in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7... | CRITICAL | Fortinet | Risk Context N/A |
CVE-2024-23108 (11) | An improper neutralization of special elements used in an os command in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7... | CRITICAL | Fortinet | Risk Context N/A |
CVE-2022-42475 (11) | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 throu... | CRITICAL | Fortinet |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21762 (10) | A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 thro... | CRITICAL | Fortinet |
CISA Known Exploited Actively Exploited Remote Code Execution |
CVE-2024-23917 (9) | In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible | CRITICAL | Jetbrains |
Remote Code Execution |
CVE-2023-34992 (9) | A improper neutralization of special elements used in an os command in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.... | CRITICAL | Fortinet | Risk Context N/A |
CVE-2023-42793 (7) | In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible | CRITICAL | Jetbrains |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2024-21887 (10) | A command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure allows an authentica... | CRITICAL | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21893 (12) | A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure and Ivanti Policy Secure and Iva... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2023-46805 (9) | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote ... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added two vulnerabilities to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-23109 |
CRITICAL CVSS 9.80 EPSS Score 0.07 EPSS Percentile 27.22 |
Risk Context N/A |
Published: Feb. 5, 2024 |
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests. |
Vendor Impacted: Fortinet |
Product Impacted: Fortisiem |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-23108 |
CRITICAL CVSS 9.80 EPSS Score 0.07 EPSS Percentile 27.22 |
Risk Context N/A |
Published: Feb. 5, 2024 |
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests. |
Vendor Impacted: Fortinet |
Product Impacted: Fortisiem |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2022-42475 |
CRITICAL CVSS 9.80 EPSS Score 43.16 EPSS Percentile 97.21 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 2, 2023 |
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. |
Vendor Impacted: Fortinet |
Products Impacted: Fortigate-6500f, Fortigate-6500f-Dc, Fortigate-6501f, Fortigate-6501f-Dc, Fortios, Fim-7904e, Fortigate-7030e, Fpm-7630e, Fortiproxy, Fim-7901e, Fortigate-7040e, Fortigate-7121f, Fpm-7620f, Fim-7920e, Fortigate-7060e, Fortigate-6601f, Fortigate-6300f, Fortigate-6300f-Dc, Fpm-7620e, Fim-7921f, Fim-7941f, Fortigate-6601f-Dc, Fim-7910e |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21762 |
CRITICAL CVSS 9.80 |
CISA Known Exploited Actively Exploited Remote Code Execution |
Published: Feb. 9, 2024 |
A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests |
Vendor Impacted: Fortinet |
Product Impacted: Fortios |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-23917 |
CRITICAL CVSS 9.80 EPSS Score 0.09 EPSS Percentile 37.30 |
Remote Code Execution |
Published: Feb. 6, 2024 |
In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible |
Vendor Impacted: Jetbrains |
Product Impacted: Teamcity |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-34992 |
CRITICAL CVSS 9.80 EPSS Score 0.07 EPSS Percentile 27.22 |
Risk Context N/A |
Published: Oct. 10, 2023 |
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests. |
Vendor Impacted: Fortinet |
Product Impacted: Fortisiem |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-42793 |
CRITICAL CVSS 9.80 EPSS Score 97.31 EPSS Percentile 99.86 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Sept. 19, 2023 |
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible |
Vendor Impacted: Jetbrains |
Product Impacted: Teamcity |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21887 |
CRITICAL CVSS 9.10 EPSS Score 97.30 EPSS Percentile 99.85 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. |
Vendor Impacted: Ivanti |
Products Impacted: Policy Secure, Connect Secure And Policy Secure, Connect Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21893 |
HIGH CVSS 8.20 EPSS Score 96.25 EPSS Percentile 99.47 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 31, 2024 |
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication. |
Vendor Impacted: Ivanti |
Products Impacted: Neurons For Zero-Trust Access, Connect Secure, Policy Secure, And Neurons, Policy Secure, Connect Secure |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-46805 |
HIGH CVSS 8.20 EPSS Score 96.27 EPSS Percentile 99.47 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. |
Vendor Impacted: Ivanti |
Products Impacted: Policy Secure, Connect Secure And Policy Secure, Connect Secure |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.